A Data Sharing Model for Blockchain Trusted Sensor Leveraging Mimic Hash Mechanism
Abstract
:1. Introduction
- (1)
- Drawing on the concept of Cyber Mimic Defense (CMD), a new type of mimic hash mechanism is proposed. By incorporating a Verifiable Random Function (VRF) and a dynamic heterogeneous redundancy architecture, the intrinsic security and reliability of sensor data during the on-chain process are significantly enhanced.
- (2)
- Based on the mimic hash mechanism, a blockchain sensor data trustworthy sharing model is constructed. This model not only ensures the trustworthy on-chain storage of sensor data but also improves the consistency and security of sensor data, offering a new solution for the sharing and trading of sensor data in the IoT environment.
- (3)
- Through theoretical analysis and simulation experiments, the effectiveness of the proposed model is verified. The experimental results show that this model can effectively solve the problem of trustworthy on-chain storage of sensor data in edge computing environments while ensuring strong consistency and security of the data on the chain.
2. Related Work
2.1. Data Consistency Verification Based on Hash Algorithms
2.2. Blockchain-Based Trustworthy Sharing of Sensor Data
2.3. Endogenous Security Mimic Defense
3. Preliminary Knowledge
3.1. Blockchain
3.2. Cyber Mimic Defense (CMD)
3.3. The Blockchain Trusted Sensors
4. Blockchain Sensor Data Trustworthy Sharing Model Based on Mimic Hash Mechanism
4.1. Model Architecture
4.2. Network Deployment
5. Mimic Hash Mechanism
5.1. Mimic Hash Scheme Based on Verifiable Random Function
- (1)
- Data Collection:
- (2)
- Data Packaging:
- (3)
- Routing Decision:
- (4)
- Data Transmission:
- (5)
- Relay Transmission (for Multi-hop Transmission):
- (6)
- Arrival at the Base Station:
- (7)
- Possible Acknowledgment and Feedback:
- (1)
- System Model and Assumptions
- a.
- System Model: Consider a Wireless Sensor Network (WSN) composed of multiple sensor nodes, each responsible for collecting environmental data and transmitting it via wireless communication.
- b.
- Security Assumptions: It is assumed that there are at least three different secure hash algorithms available within the network, and adversaries cannot predict in advance which hash algorithm each node will use.
- (2)
- Core Design of the Mimic Hash Mechanism
- a.
- Hash Algorithm Selection: Define three different hash algorithms .
- b.
- Round Definition: Define the round as the sequence of data packet transmission in the WSN, initialized to .
- (3)
- Data Collection and Processing
- a.
- Data Collection: In each round , sensor nodes collect environmental data .
- b.
- Hash Certificate Generation: Nodes generate a hash certificate for their data and the state from the previous round .
- (4)
- Dynamic Selection of Hash Algorithm
- a.
- Certificate Calculation: The th sensor calculates the Verifiable Random Function certificate .
- b.
- Algorithm Determination: Dynamically select the hash algorithm based on , where:
- (5)
- Hash Processing and State Update
- a.
- Hash Processing: Hash the data using the selected hash algorithm to generate the hash value .
- b.
- State Update: Update the node state to .
- (6)
- Blockchain Integration
- a.
- Blockchain Records: Store along with related information (such as timestamps, node ID, etc.) in the blockchain to ensure data integrity and traceability.
- (7)
- Communication and Verification
- a.
- Data Transmission: Transmit the updated state and related verification certificates through the WSN.
- b.
- Verification: The receiving node verifies the incoming and its associated verification certificates to ensure the data’s integrity and authenticity.
- (8)
- Update of Transmission Round
- a.
- Increment Round: After completing a round of data transmission and verification, increment the round to prepare for the next cycle of data collection and processing.
Algorithm 1: WSN Mimic Hash Mechanism |
Input: Sensor data set D, previous round state , round r Output: Updated state 1: function , r) 2: Initialize hash algorithms 3: Initialize round r = 0 4: Generate initial state for each node 5: for each round r do 6: // Data collection 7: () 8: // Generate hash certificate 9: r )) 10: // Select hash algorithm based on certificate 11: mod 3) 12: 13: 14: 15: end switch 16: // Calculate hash value 17: 18: // Update state 19: 20: // Record to blockchain 21: 22: // Transmission and verification 23: 24: // Update round 25: r ← r + 1 26: end for 27: 28: end function |
5.2. Mimic Hash Scheme Based on Mimic Defense
5.2.1. Model Architecture
5.2.2. Operating Mechanism
- (1)
- Initialization: Select an initial set of three heterogeneous executors (including random and different S and R, and the same H) from the heterogeneous resource pool as the working set.
- (2)
- Input Proxy: According to the instructions of the negative feedback controller, the input proxy distributes the input sequence (original data) to the corresponding (3) heterogeneous executors.
- (3)
- Reconfigurable Executor Set: The three heterogeneous executors, stimulated by the input, should under high-probability conditions be able to work normally and independently produce output vectors (hash results) that meet given semantics and syntax.
- (4)
- Multimode Adjudicator: Based on the adjudication parameters or algorithm-generated adjudication strategy, assesses the consistency of the multimode output vector content and forms an output response sequence. If an undesired state is detected, it activates the negative feedback controller.
- (5)
- Negative Feedback Controller: Upon activation, decides whether to send a command to the output proxy to replace (migrate) the “output anomaly” executor based on the control algorithm generated by control parameters, or instruct the suspected problematic executor to implement online/offline cleaning and recovery operations (including triggering additional background processing functions), or perform a combination of reassembly, reconstruction, and reconfiguration operations on the anomalous executor under functionally equivalent conditions based on software and hardware components. This activation process continues until the inconsistency in the output vector disappears in the multimode adjudication phase or the frequency of such occurrences falls below a given threshold, at which point it pauses.
5.2.3. Blockchain-Based Mimic Hash Executor Scheduling and Consensus Adjudication Method
- a.
- Select the top weights from , and one to from executors (, where is the number of all possible combinations in the system). Launch online and form an endorsing node list sorted by weight.
- b.
- When a new task arises, only these endorsing nodes are required to compute and produce results.
- c.
- Once an endorsing node completes its computation, it sends its result to other nodes. When more than 2/3 of the nodes receive the same result, the task is considered complete. The nodes that complete the computation are then awarded certain weight rewards, which might be achieved by increasing the node’s value (execution success rate) or directly increasing the node’s weight.
- a.
- If a node finds that its computation result is inconsistent with the results of the majority (over 2/3) of nodes, it initiates a vote, requesting all nodes to verify this result.
- b.
- If a node’s number of votes exceeds the threshold within a certain period, it will be removed from the list of endorsing nodes, triggering the negative feedback controller for processing.
- a.
- If a node’s weight is reduced or it is removed from the list of endorsing nodes, its relevant historical data will be collected, including changes in its weight, number of votes, and accuracy of computation results.
- b.
- Use this historical data to train a decision tree model to predict which nodes may produce erroneous voting results. Divide the data into a training set and a test set, use the training set to train the model, and finally use the test set to evaluate the model’s performance.
- c.
- Based on the results predicted by the model, take preemptive action on nodes that may pose problems, such as reducing their weight or removing them from the list of endorsing nodes.
6. Security Analysis
6.1. Security Objective Definitions
6.2. Security Proof
7. Experimental Analysis
7.1. Experimental Environment
7.2. Experimental Analysis
8. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Pardeshi, M.S.; Sheu, R.-K.; Yuan, S.-M. Hash-Chain Fog/Edge: A Mode-Based Hash-Chain for Secured Mutual Authentication Protocol Using Zero-Knowledge Proofs in Fog/Edge. Sensors 2022, 22, 607. [Google Scholar] [CrossRef] [PubMed]
- Heiss, J.; Busse, A.; Tai, S. Trustworthy pre-processing of sensor data in data on-chaining workflows for blockchain-based IoT applications. In Proceedings of the Service-Oriented Computing: 19th International Conference, ICSOC 2021, Virtual Event, 22–25 November 2021; pp. 133–149. [Google Scholar]
- Zhang, R.; Xue, R.; Liu, L. Security and privacy on blockchain. ACM Comput. Surv. (CSUR) 2019, 52, 1–34. [Google Scholar] [CrossRef]
- Gao, H.; Gao, T.G. A lightweight robust image hash based on random tensors and angle features for IoT devices. Signal Image Video Process. 2024, 18, 1747–1761. [Google Scholar] [CrossRef]
- Salman, D.S.; Naif, J.R. Smart cloud security using hybrid encryption algorithms with 4-d chaotic key. J. Res. Adm. 2023, 5, 1816–1837. [Google Scholar]
- Joy, J.; Devaraju, S. Avoidance of duplicacy and compelling cloud security indifferent cloud situations. Int. J. Creat. Res. Thoughts 2023, 11, 543–555. [Google Scholar]
- Chen, L.; Xiang, F.; Sun, Z. A survey of blockchain security technologies based on attribute-based cryptography. Acta Electron. Sin. 2021, 49, 192–200. [Google Scholar]
- Si, X.M. A Security Verification Method, Terminal, and System Based on Keyed Hash Chains. Patent CN115883101A, 31 March 2023. [Google Scholar]
- Si, X.M.; Guo, S.K. A Blockchain Data Transmission Method and System Based on Keyless Signatures. Patent CN115694811A, 3 February 2023. [Google Scholar]
- Zhang, D.F.; Guan, L.; Dai, X.M. Design and implementation of the rainbow table lookup system based on password cracking. Cyberspace Secur. 2020, 11, 1. [Google Scholar]
- Yu, H.B.; He, L.; Cheng, Z.J. Improved Cryptanalysis on Checkpoints in Perfect Rainbow Table. J. Cryptologic Res. 2021, 8, 76–86. [Google Scholar] [CrossRef]
- Wang, X.; He, Z.H.; Xu, Y.; Pang, S.S.; Wang, X.C.; Zhou, C.; Du, P. Hash Attacks Prevention for Instruction Security in Embedded Monitoring System. In Proceedings of the 2016 Joint International Conference on Service Science, Management and Engineering (SSME 2016) and International Conference on Information Science and Technology (IST 2016), Wuhan, China, 20–21 August 2016; ISBN 978-1-60595-379-3. [Google Scholar]
- Qi, X.; Wei, M.R.; Jiang, W.B. Security Analysis and Comparison of Password Encryption Algorithms. Cyberspace Secur. 2016, 7, 34–38. [Google Scholar]
- Zhang, W.C.; Li, H.; Cheng, G. Research and Implementation of Secure Password Storage Based on the One-way Salted Hashing Algorithm. China Digit. Med. 2018, 5, 8–11. [Google Scholar] [CrossRef]
- Zhu, Y.B.; Wang, C.L. A Message–digest Model with Salt and Hidden Feature of Hash. Comput. Technol. Dev. 2013, 23, 134–138. [Google Scholar]
- Si, X.M. A Blockchain Data Storage Method and terminal for sensor Networks. Patent CN115842834A, 24 March 2023. [Google Scholar]
- Wu, J.X. Research on Cyber Mimic Defense. J. Cyber Secur. 2016, 1, 1–10. [Google Scholar] [CrossRef]
- Tong, Q.; Zhang, Z.; Zhang, W.H.; Wu, J.X. Design and Implementation of Mimic Defense Web Server. J. Softw. 2017, 28, 883–897. [Google Scholar] [CrossRef]
- Ma, H.L.; Yi, P.; Jiang, Y.M.; He, L. Dynamic Heterogeneous Redundancy based Router Architecture with Mimic Defenses. J. Cyber Secur. 2017, 2, 29–42. [Google Scholar] [CrossRef]
- Wang, Z.P.; Hu, H.C.; Cheng, G.Z. A DNS Architecture Based on Mimic Security Defense. Acta Electron. Sin. 2017, 45, 2705–2714. [Google Scholar] [CrossRef]
- Xu, M.X.; Yuan, C.; Wang, Y.J.; Fu, J.H.; Li, B. Mimic Blockchain—Solution to the Security of Blockchain. J. Softw. 2019, 30, 1681–1691. [Google Scholar] [CrossRef]
- Gui, Z.; Sun, Z.; Huang, Z. Spatial Query Optimization Methods by Integrating Blockchain and Database. Acta Sci. Nat. Univ. Pekin. 2023, 59, 261–270. [Google Scholar] [CrossRef]
- Shao, Q.F.; Jin, Q.Z.; Zhang, Z.; Qian, W.N.; Zhou, A.Y. Blockchain: Architecture and Research Progress. Chinese Journal Computers. 2018, 41, 969–988. [Google Scholar]
- Si, X.M.; Wang, W.; Zeng, J.J.; Yang, B.C.; Li, G.S.; Yuan,, C.; Zhang, F. A Review of the Basic Theory of Mimic Defense. Strateg. Study CAE 2016, 18, 62–68. [Google Scholar] [CrossRef]
- Li, Z.M. Design and Analysis of the Hash Functions. Ph.D. Thesis, Beijing University of Posts, Beijing, China, 2009. [Google Scholar]
- Qiu, Y.F. Implementation and Verification of Hash Algorithm. Master’s Thesis, Guangdong University of Technology, Guangzhou, China, 2021. [Google Scholar]
Scheme | MD5 | SHA-1 | SHA-256 |
---|---|---|---|
Hash collision attacks | md5collgen | SHA1collision | - |
Rainbow table attacks | RainbowCrack | ||
Short password attacks | https://github.com/FrankGrimmer/dictionary-password-cracker, accessed on 8 February 2024. |
Hash Algorithm | Dataset | State Distribution |
---|---|---|
MD5 | B or C | Successful |
Except B & C | Failed | |
SHA-1 | D or E | Successful |
Except D & E | Failed |
Comparison Item | Single Hash Mechanism | Mimic Hash |
---|---|---|
Data Volume (unit: items) | 15,500 | 15,500 |
Number of Rainbow Tables (unit: count) | 1 | 3 |
Rainbow Table Generation Time (unit: seconds) | 3503 | 15,609 |
Rainbow Table Storage Size (unit: KB) | 545 | 1937 |
Rainbow Table Attack Time Complexity | O(n) | O(3n) |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Quan, G.; Yao, Z.; Si, X.; Zhu, W.; Chen, L. A Data Sharing Model for Blockchain Trusted Sensor Leveraging Mimic Hash Mechanism. Electronics 2024, 13, 1495. https://doi.org/10.3390/electronics13081495
Quan G, Yao Z, Si X, Zhu W, Chen L. A Data Sharing Model for Blockchain Trusted Sensor Leveraging Mimic Hash Mechanism. Electronics. 2024; 13(8):1495. https://doi.org/10.3390/electronics13081495
Chicago/Turabian StyleQuan, Gaoyuan, Zhongyuan Yao, Xueming Si, Weihua Zhu, and Longfei Chen. 2024. "A Data Sharing Model for Blockchain Trusted Sensor Leveraging Mimic Hash Mechanism" Electronics 13, no. 8: 1495. https://doi.org/10.3390/electronics13081495